[Bug 1191299] New: VUL-0: CVE-2021-41099: redis: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value
http://bugzilla.opensuse.org/show_bug.cgi?id=1191299 Bug ID: 1191299 Summary: VUL-0: CVE-2021-41099: redis: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.3 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: danilo.spinella@suse.com Reporter: Andreas.Stieger@gmx.de QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- Fixed in Redis 6.2.6, 6.0.16 and 5.0.14 CVE-2021-41099: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value References: https://github.com/redis/redis/commit/24cc0b984d4ed5045c6ff125b0e619b6ce5ea9... https://groups.google.com/g/redis-db/c/GS_9L2KCk9g/m/Q7ZN1R1cDAAJ -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1191299 Andreas Stieger <Andreas.Stieger@gmx.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |michael@stroeder.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1191299 http://bugzilla.opensuse.org/show_bug.cgi?id=1191299#c1 --- Comment #1 from Michael Str�der <michael@stroeder.com> --- Update for Tumbleweed: https://build.opensuse.org/request/show/923120 -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com